News & Analysis as of

Cyber Threats Cyber Attacks Phishing Scams

Robinson+Cole Data Privacy + Security Insider

Social Engineering + Stolen Credential Threats Continue to Dominate Cyber-Attacks

CrowdStrike recently published its 2025 Global Threat Report, which among other conclusions, emphasized that social engineering tactics aimed to steal credentials grew an astounding 442% in the second half of 2024....more

Alston & Bird

Ransom Payments at a Historic Low According to Report

Alston & Bird on

On February 4, 2025, Coveware, Inc. released its quarterly ransomware report for the fourth quarter of 2024, and identified that the percentage of victims paying ransoms fell to a historic low of 25%.  While the average...more

EDRM - Electronic Discovery Reference Model

From Moscow to Pyongyang: Cyber Threats Revealed by Sandra Joyce at the Tallinn Digital Summit

ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #421 – Threat Actors Using DocuSign API to Send Fake Invoices

DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send fake invoices to divert...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Ankura

‘Dark’ AI: The Emergence of Generative AI Tools Tailored for Threat Actors

Ankura on

Technological advancements are plentiful in the world of cybersecurity and are often seen as a double-edged sword, a sentiment that holds true in the rise of generative AI. As AI gains traction for its versatility and power,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #416 – Impersonation is the Most Prolific Phishing Tactic in 2024

A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

BakerHostetler

Deeper Dive: Understanding the 2023-24 Crypto Threat Landscape

BakerHostetler on

As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more

Hogan Lovells

Adversary-in-the-Middle attacks can subvert passkey protections

Hogan Lovells on

Backup authentication methods create a vulnerability in passkey protection to adversary-in-the-middle attacks. Security protections from passkey authentication can still potentially be subverted by attackers....more

Morgan Lewis - Health Law Scan

HHS and FBI Release Joint Cybersecurity Advisory Statement for Healthcare Providers

Shortly after our prior blog post discussing the need for healthcare entities to shore up protections against phishing attacks, the Department of Health and Human Services (HHS) and the Federal Bureau of Investigation (FBI)...more

Ankura

Proactive Defense: A Step-by-Step Guide To Assessing Your Organization's Cyber Risk

Ankura on

In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Katten Muchin Rosenman LLP

Gone Phishing – Vigilance in the New Scam Era - Kattison Avenue | Issue 12

"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more

Bricker Graydon LLP

Key Insights for School District Leaders

Bricker Graydon LLP on

It’s not getting any easier. In fact, “for K-12 schools, cyber incidents are so prevalent that, on average, there is more than one incident per school day.” While high-profile cyber threats like ransomware and data...more

Guidepost Solutions LLC

Defending Your Law Firm Against Cyber Threats

In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Woodruff Sawyer

Cyber Liability for Trustees: Preventing and Managing Breaches

Woodruff Sawyer on

A friend—a small business owner—recently shared a very stressful situation. She had a significant cyber breach that almost cost them hundreds of thousands of dollars. What happened? She had hired a new assistant and issued a...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #358 – Bank Failures Give Hackers New Strategy for Attacks

Hackers are always looking for the next opportunity to launch attacks against unsuspecting victims. According to Cybersecurity Dive, researchers at Proofpoint recently observed “a phishing campaign designed to exploit the...more

Ankura

The Breaches and Threat Actors that Defined 2022

Ankura on

In 2022, threat actors and hacker groups made their mark on the digital world by causing unprecedented data breaches that left organizations of all sizes and sectors vulnerable. Even with improved cybersecurity measures in...more

Robinson+Cole Data Privacy + Security Insider

Beware of Luna Moth Callback Phishing Scam

Palo Alto’s Unit 42 recently issued a threat assessment alert outlining a new phishing scam that is unique and successful. The scam is believed to be carried out by the Luna Moth/Silent Ransom Group and is targeting...more

Warner Norcross + Judd

[Webinar] Wire Transfer Fraud: Preventing and Mitigating this Rising Threat - December 6th, 12:00 pm - 1:00 pm ET

Warner Norcross + Judd on

Join Warner Norcross + Judd LLP attorneys Madelaine Lane, Kelly Hollingsworth and Nate Steed for a webinar focused on preventing and mitigating wire transfer fraud. Cyber criminals are utilizing phishing emails and other...more

Sheppard Mullin Richter & Hampton LLP

NYDFS’s $4.5 Million EyeMed Cyber Settlement Reminder To Industry

In a recent settlement with the New York Department of Financial Services, EyeMed Vision Care LLC agreed to pay a $4.5 million penalty and undertake remedial measures to increase its cybersecurity. This includes undertaking...more

Goldberg Segalla

Cybersecurity Risks for Business- A Primer on Prevention

Goldberg Segalla on

As technology evolves, companies are finding ways to become more nimble and conduct business more efficiently — over remote networks, email on handheld devices, the cloud, and on cellphones. Yet, as technology advances, so...more

97 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide